A blockchain-based file protection method and terminal equipment

A terminal device and blockchain technology, applied in the computer field, can solve problems such as leakage and low data security, and achieve the effects of increasing security, improving security, increasing complexity and difficulty

Active Publication Date: 2022-04-05
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a blockchain-based file protection method and terminal equipment to solve the problem of low data security in the prior art due to the decompilation of the executable file of the application program and the leak of the source code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based file protection method and terminal equipment
  • A blockchain-based file protection method and terminal equipment
  • A blockchain-based file protection method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] see figure 1 , figure 1 It is an implementation flowchart of a blockchain-based file protection method provided by an embodiment of the present invention. In this embodiment, the execution subject of the blockchain-based file protection method is a terminal device, which includes but is not limited to mobile terminals such as smart phones, tablet computers, and notebook computers, and may also include desktop computers. The blockchain-based file protection method shown in the figure includes the following steps:

[0027] S101: Obtain the type information of the first file that needs to be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is applicable to the field of computer technology, and provides a block chain-based file protection method and terminal equipment. The method includes: obtaining type information of a first file to be protected; the type information is used to identify the first The programming language used by the source file corresponding to the file; determine the protection information of the first file according to the type information; the protection information is used to prevent decompilation; configure the protection information to the The first file obtains a second file; the execution logic of the second file is the same as the execution logic of the first file. The present invention can improve the data security of the first file and improve the corresponding The purpose of the security of the application's user information or user property.

Description

technical field [0001] The invention belongs to the field of computer technology, and in particular relates to a block chain-based file protection method and terminal equipment. Background technique [0002] With the development of the mobile Internet, applications providing various services emerge as the times require. Users can download and install applications on terminals, and use the applications (Application, App) to enjoy corresponding services. For example, blockchain apps, taxi apps, financial apps, etc. [0003] However, after the application is installed on the terminal, it is easy to be attacked by hackers or criminals through decompilation tools to obtain the executable file in the installation package of the application, and decompile the executable file to obtain the source code of the feasible file , Steal the algorithm contained in the source code or tamper with the source code, etc., which will lead to the theft of user information or user property of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/62
CPCG06F21/14G06F21/6209
Inventor 谢丹力张宇陆陈一帆
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products